首页    期刊浏览 2025年07月27日 星期日
登录注册

文章基本信息

  • 标题:Chronological Examination of Insider Threat Sabotage: Preliminary Observations
  • 本地全文:下载
  • 作者:William R. Claycomb ; Carly L. Huth ; Lori Flynn
  • 期刊名称:Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
  • 印刷版ISSN:2093-5374
  • 电子版ISSN:2093-5382
  • 出版年度:2012
  • 卷号:3
  • 期号:4
  • 页码:4-20
  • 出版社:Innovative Information Science & Technology Research Group
  • 摘要:The threat of malicious insiders to organizations is persistent and increasing. We examine 15 real cases of insider threat sabotage of IT systems to identify several key points in the attack time-line, such as when the insider clearly became disgruntled, began attack preparations, and carried out the attack. We also determine when the attack stopped, when it was detected, and when action was taken on the insider. We found that 7 of the insiders we studied clearly became disgruntled more than 28 days prior to attack, but 9 did not carry out malicious acts until less than a day prior to attack. Of the 15 attacks, 8 ended within a day, 12 were detected within a week, and in 10 cases action was taken on the insider within a month. This exercise is a proof-of-concept for future work on larger data sets, and in this paper we detail our study methods and results, discuss challenges we faced, and identify potential new research directions
  • 关键词:insider threat; sabotage; security
国家哲学社会科学文献中心版权所有